O'Reilly logo

31 Days Before Your CCENT Certification by Scott Bennett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CCNA Discovery 1, Chapter 8

8.1.1: An insecure network is vulnerable to information theft, identity theft, data loss or manipulation, and a possible disruption of service. A network faces external threats from unauthorized users who may attack from the Internet, wireless links, or dialup networks. In addition, internal users with physical and authorized access can intentionally or unintentionally harm a network.

8.1.3: An unauthorized user may employ techniques that trick authorized users into revealing sensitive information or taking an action that threatens a network. The following points describe common social engineering techniques that focus on the user as the weak link:

Pretexting: An attacker contacts a user masquerading as the help ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required